Skip to content

Commit 78a6136

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into Guidebook
2 parents 21e2ed7 + 5f83e90 commit 78a6136

21 files changed

+172
-201
lines changed

defender-endpoint/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
items:
99
- name: What is Microsoft Defender for Endpoint?
1010
items:
11-
- name: Defender for Endpoint on Windows
11+
- name: Defender for Endpoint
1212
href: microsoft-defender-endpoint.md
1313
- name: Defender for Endpoint on macOS
1414
href: microsoft-defender-endpoint-mac.md

defender-endpoint/android-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: how-to
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 10/23/2025
18+
ms.date: 11/06/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
@@ -33,7 +33,7 @@ For more information about how to set up Defender for Endpoint on Android and Co
3333
## Configure custom indicators
3434

3535
> [!NOTE]
36-
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
36+
> Defender for Endpoint on Android supports creating custom indicators only for URLs and domains. IP-based custom indicators aren't supported on Android.
3737
>
3838
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
3939
> Also, alerts for custom indicators are currently not supported for Defender for Endpoint on Android.

defender-endpoint/api/exposed-apis-create-app-webapp.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,8 @@ Having the [Microsoft Entra role](/entra/identity/role-based-access-control/mana
5050

5151
## Step 2: Add a secret to your app
5252

53+
This section describes authenticating your app using an app secret. To authenticate your app using a certificate, see [Create a self-signed public certificate to authenticate your application](/entra/identity-platform/howto-create-self-signed-certificate).
54+
5355
1. From the application page, select *Certificates & secrets* > *New client secret*.
5456

5557
2. In the *Add a client secret* pane, add a description and expiration date.
@@ -163,11 +165,3 @@ var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter
163165
request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
164166
var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
165167
```
166-
167-
## See also
168-
169-
* [Get access with user context](exposed-apis-create-app-nativeapp.md)
170-
171-
* [Supported Microsoft Defender for Endpoint APIs](exposed-apis-list.md)
172-
173-
* [Access Microsoft Defender for Endpoint on behalf of a user](exposed-apis-create-app-nativeapp.md)

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -39,19 +39,19 @@ This playbook is a simple guide to help you make the most of your free trial. Us
3939
<center><h2>Microsoft Defender for Endpoint</center></h2>
4040
<table>
4141
<tr>
42-
<td><a href="microsoft-defender-endpoint.md#tvm"><center><img src="media/logo-mdvm.png" alt="Vulnerability Management"> <br><b> Core Defender Vulnerability Management</b></center></a></td>
43-
<td><a href="microsoft-defender-endpoint.md#asr"><center><img src="media/asr-icon.png" alt="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
44-
<td><center><a href="microsoft-defender-endpoint.md#ngp"><img src="media/ngp-icon.png" alt="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
45-
<td><center><a href="microsoft-defender-endpoint.md#edr"><img src="media/edr-icon.png" alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
46-
<td><center><a href="microsoft-defender-endpoint.md#ai"><img src="media/air-icon.png" alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
47-
<td><center><a href="microsoft-defender-endpoint.md#mte"><img src="media/mte-icon.png" alt="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
42+
<td><a href="/defender-vulnerability-management/defender-vulnerability-management"><center><img src="media/logo-mdvm.png" alt="Vulnerability Management"> <br><b> Core Defender Vulnerability Management</b></center></a></td>
43+
<td><a href="overview-attack-surface-reduction.md"><center><img src="media/asr-icon.png" alt="Attack surface reduction"><br><b>Attack surface reduction</b></center></a></td>
44+
<td><center><a href="next-generation-protection.md"><img src="media/ngp-icon.png" alt="Next-generation protection"><br> <b>Next-generation protection</b></a></center></td>
45+
<td><center><a href="overview-endpoint-detection-response.md"><img src="media/edr-icon.png" alt="Endpoint detection and response"><br> <b>Endpoint detection and response</b></a></center></td>
46+
<td><center><a href="automated-investigations.md"><img src="media/air-icon.png" alt="Automated investigation and remediation"><br> <b>Automated investigation and remediation</b></a></center></td>
47+
<td><center><a href="endpoint-attack-notifications.md"><img src="media/mte-icon.png" alt="Microsoft Threat Experts"><br> <b>Microsoft Threat Experts</b></a></center></td>
4848
</tr>
4949
<tr>
5050
<td colspan="7">
51-
<a href="microsoft-defender-endpoint.md#apis"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
51+
<a href="api/management-apis.md"><center><b>Centralized configuration and administration, APIs</a></b></center></td>
5252
</tr>
5353
<tr>
54-
<td colspan="7"><a href="microsoft-defender-endpoint.md#mtp"><center><b>Microsoft Defender portal</a></center></b></td>
54+
<td colspan="7"><a href="/unified-secops/overview-defender-portal"><center><b>Microsoft Defender portal</a></center></b></td>
5555
</tr>
5656
</table>
5757
<br>

defender-endpoint/indicators-overview.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,11 @@ When your security team creates a new indicator (IoC), the following actions are
119119
> [!NOTE]
120120
> Using Warn mode prompts users with a warning if they open a risky app or website. The prompt doesn't block them from allowing the application or website to run, but you can provide a custom message and links to a company page that describes appropriate usage of the app. Users can still bypass the warning and continue to use the app if necessary. For more information, see [Govern apps discovered by Microsoft Defender for Endpoint](/defender-cloud-apps/mde-govern).
121121
122+
> [!NOTE]
123+
> For Warn action, To receive the toast notification to be able to bypass the IoC, make sure the **“Files or activities are blocked”** option is enabled under **Virus & Threat Protection notifications**. The corresponding registry key should be set as follows: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Defender Security Center\Virus and threat protection\FilesBlockedNotificationDisabled = 0.
124+
>
125+
> More details see **[Windows Security app settings](https://support.microsoft.com/windows/windows-security-app-settings-1ec98620-4e41-4b6b-b055-3c4bb115d4ee#bkmk_notifications)**.
126+
122127
You can create an indicator for:
123128

124129
- [Files](indicator-file.md)

defender-endpoint/ios-whatsnew.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: lwainstein
66
author: limwainstein
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 09/05/2025
9+
ms.date: 11/06/2025
1010
manager: bagol
1111
audience: ITPro
1212
ms.collection:
@@ -29,11 +29,25 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
2929

3030
## Releases for Defender for Endpoint on iOS
3131

32+
#### November 2025
33+
34+
| Build| 1.1.70290103|
35+
| -------- | -------- |
36+
| Release Date |November 6, 2025|
37+
38+
**What's New**
39+
40+
- An improved user feedback experience: See [Key Changes - November 2025](./ios-new-ux.md#key-changes---november-2025) for details.
41+
42+
- Added Landscape mode UI support for the Defender app.
43+
44+
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
45+
3246
#### October 2025
3347

3448
| Build| 1.1.70230101|
3549
| -------- | -------- |
36-
| Release Date |October 28, 2025|
50+
| Release Date |October 26, 2025|
3751

3852
**What's New**
3953

defender-endpoint/mac-device-control-overview.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Device control for macOS
33
description: Learn how to configure Microsoft Defender for Endpoint on Mac to reduce threats from removable storage such as USB devices.
44
ms.service: defender-endpoint
@@ -27,11 +27,7 @@ appliesto:
2727

2828
## Requirements
2929

30-
Device control for macOS has the following prerequisites:
31-
32-
- Defender for Endpoint or Defender for Business licenses (can be a trial subscription)
33-
- Minimum OS version: macOS 11 or higher
34-
- Minimum product version: `101.34.20`
30+
Device control for macOS is available on the versions listed in the [System requirements](/defender-endpoint/microsoft-defender-endpoint-mac) section of Defender for Endpoint on macOS documentation.
3531

3632
## Overview
3733

120 KB
Loading

0 commit comments

Comments
 (0)